Suspicious person detection system, suspicious person detection method
a detection system and suspicious person technology, applied in the field of suspicious person detection, can solve the problems of complicated system configuration, inability to detect suspicious persons, and difficulty in introducing systems, and achieve the effect of less likely to cause and easy introduction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021]FIG. 1 is a diagram illustrating a schematic configuration of a suspicious person detection system according to an embodiment. As illustrated in FIG. 1, the suspicious person detection system includes a probe request detection terminal 100 provided in association with an area for which a suspicious person is to be detected, an analyzing apparatus 200 provided at a location different from a location of the probe request detection terminal 100, and an information processing apparatus 300 which, in the case where a suspicious person is detected in the above-described predetermined area, receives and displays information indicating that the suspicious person is detected (suspicious person information). The probe request detection terminal 100, the analyzing apparatus 200 and the information processing apparatus 300 are connected to each other via a communication network N so that they can perform information communication. Note that the probe request detection terminal 100 corresp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


